Defining ICS-specific security policies, standards, and procedures

Preparing to answer the question, "What am I worried about that could happen to our ICS systems?" can help complete this activity.

During this security program development activity, ICS-specific security policies are conceptualized. The goal is to create a set of policies that is applicable to the ICS and its environment. The best approach to successfully complete this activity is through round table conversations with relevant IT personnel, management, ICS owners, stakeholders, and the various subject matter experts. Each policy under consideration should be individually discussed ...

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.